Analysis

  • max time kernel
    147s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2024, 15:16

General

  • Target

    5909d6d14d950b48b584f4a5efde04e9.exe

  • Size

    15KB

  • MD5

    5909d6d14d950b48b584f4a5efde04e9

  • SHA1

    cff3a2a95157a3069c1b185c99b1d532e28960b0

  • SHA256

    98b8bd3ddcabb1fd179f218f609fbc9e296d26324868267709a686ccf7f56235

  • SHA512

    64a70735222e6d33099f23855b5c55b2e97152f2b22942f1118f330a01f67acc364d04b2183a42d1bee38222f63bb7a749f864eb82abaca733bcbeaa17fdba17

  • SSDEEP

    192:HqLjW+ys/rUcUYDdzluSakp0JTyRK7HVk/XdPLif63fr5vkH0QqeC+eZxxiTgbk1:ky+yOYc3akio6VkFPZ31sH0FZzi7S

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5909d6d14d950b48b584f4a5efde04e9.exe
    "C:\Users\Admin\AppData\Local\Temp\5909d6d14d950b48b584f4a5efde04e9.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4620
    • \??\c:\windows\ld12.exe
      c:\windows\ld12.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:3744
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\34rdft.bat
      2⤵
        PID:4520

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\34rdft.bat

      Filesize

      240B

      MD5

      003aa1c15eb8820dec7b3a9b0e13081f

      SHA1

      3ef91fa3e090a2403a05a4049d420274190dd7c5

      SHA256

      ff3bd185018a6ca60f16f138fe9b44365e357e4e005a5217b0427be6a3ab424e

      SHA512

      abde6e931a20cfd028ed301cc1802145497220700445f285ac628824a5074a9ed712cd24cdc63ca4c0f8bd64943eeb7cfbc7672b9f30d791229176dad52a4737

    • C:\Windows\ld12.exe

      Filesize

      15KB

      MD5

      5909d6d14d950b48b584f4a5efde04e9

      SHA1

      cff3a2a95157a3069c1b185c99b1d532e28960b0

      SHA256

      98b8bd3ddcabb1fd179f218f609fbc9e296d26324868267709a686ccf7f56235

      SHA512

      64a70735222e6d33099f23855b5c55b2e97152f2b22942f1118f330a01f67acc364d04b2183a42d1bee38222f63bb7a749f864eb82abaca733bcbeaa17fdba17

    • memory/3744-8-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/4620-0-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/4620-10-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB